首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
Phishing web sites features classification based on extreme learning machine 基于极限学习机的钓鱼网站特征分类
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355342
Yasin Sönmez, T. Tuncer, Hüseyin Gökal, E. Avci
Phishing are one of the most common and most dangerous attacks among cybercrimes. The aim of these attacks is to steal the information used by individuals and organizations to conduct transactions. Phishing websites contain various hints among their contents and web browser-based information. The purpose of this study is to perform Extreme Learning Machine (ELM) based classification for 30 features including Phishing Websites Data in UC Irvine Machine Learning Repository database. For results assessment, ELM was compared with other machine learning methods such as Support Vector Machine (SVM), Naïve Bayes (NB) and detected to have the highest accuracy of 95.34%.
网络钓鱼是网络犯罪中最常见、最危险的攻击之一。这些攻击的目的是窃取个人和组织用于进行交易的信息。网络钓鱼网站在其内容和基于浏览器的信息中包含各种提示。本研究的目的是对加州大学欧文分校机器学习存储库数据库中的30个特征(包括钓鱼网站数据)进行基于极限学习机(ELM)的分类。在结果评估方面,将ELM与支持向量机(SVM)、Naïve贝叶斯(NB)等其他机器学习方法进行比较,发现准确率最高,达到95.34%。
{"title":"Phishing web sites features classification based on extreme learning machine","authors":"Yasin Sönmez, T. Tuncer, Hüseyin Gökal, E. Avci","doi":"10.1109/ISDFS.2018.8355342","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355342","url":null,"abstract":"Phishing are one of the most common and most dangerous attacks among cybercrimes. The aim of these attacks is to steal the information used by individuals and organizations to conduct transactions. Phishing websites contain various hints among their contents and web browser-based information. The purpose of this study is to perform Extreme Learning Machine (ELM) based classification for 30 features including Phishing Websites Data in UC Irvine Machine Learning Repository database. For results assessment, ELM was compared with other machine learning methods such as Support Vector Machine (SVM), Naïve Bayes (NB) and detected to have the highest accuracy of 95.34%.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
An anomaly detection approach for enterprise file integration 一种企业文件集成异常检测方法
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355376
İbrahim Üzüm, Özgü Can
An information system based on real-time file integrations has an important role in today's organizations' work process management. By connecting to the network, file flow and integration between corporate systems have gained a great significance. In addition, network and security issues have emerged depending on the file structure and transfer processes. Thus, there has become a need for an effective and self-learning anomaly detection module for file transfer processes in order to provide the persistence of integration channels, accountability of transfer logs and data integrity. This paper proposes a novel anomaly detection approach that focuses on file size and integration duration of file transfers between enterprise systems. For this purpose, size and time anomalies on transferring files will be detected by a machine learning-based structure. Later, an alarm system is going to be developed in order to inform the authenticated individuals about the anomalies.
基于实时文件集成的信息系统在当今组织的工作流程管理中具有重要的作用。通过网络的连接,企业系统之间的文件流动和集成具有重要意义。此外,由于文件结构和传输过程的不同,网络和安全问题也随之出现。因此,为了提供集成通道的持久性、传输日志的可问责性和数据完整性,需要一种有效的、自学习的文件传输过程异常检测模块。本文提出了一种新的异常检测方法,该方法关注企业系统间文件传输的文件大小和集成时间。为此,将通过基于机器学习的结构检测传输文件的大小和时间异常。稍后,将开发一个警报系统,以便通知通过身份验证的个人有关异常情况。
{"title":"An anomaly detection approach for enterprise file integration","authors":"İbrahim Üzüm, Özgü Can","doi":"10.1109/ISDFS.2018.8355376","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355376","url":null,"abstract":"An information system based on real-time file integrations has an important role in today's organizations' work process management. By connecting to the network, file flow and integration between corporate systems have gained a great significance. In addition, network and security issues have emerged depending on the file structure and transfer processes. Thus, there has become a need for an effective and self-learning anomaly detection module for file transfer processes in order to provide the persistence of integration channels, accountability of transfer logs and data integrity. This paper proposes a novel anomaly detection approach that focuses on file size and integration duration of file transfers between enterprise systems. For this purpose, size and time anomalies on transferring files will be detected by a machine learning-based structure. Later, an alarm system is going to be developed in order to inform the authenticated individuals about the anomalies.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information analysis and cyber crimes in Deep Web & Dark Web 深网与暗网中的信息分析与网络犯罪
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355358
Oguzhan Akyildiz
In this study, Deep Web and Dark Web concepts and their relation to each other were evaluated. The working mechanisms of Deep Web and Dark Web examined, the data collected from these media analyzed and the collected data evaluated in terms of information security. Deep Web and Dark Web environments encountered in the criminal content of cyber actions were classified.
在本研究中,深网和暗网的概念及其相互关系进行了评估。研究了深网和暗网的工作机制,分析了从这些媒体收集到的数据,并从信息安全角度对收集到的数据进行了评估。深网和暗网环境中遇到的网络犯罪行为内容被分类。
{"title":"Information analysis and cyber crimes in Deep Web & Dark Web","authors":"Oguzhan Akyildiz","doi":"10.1109/ISDFS.2018.8355358","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355358","url":null,"abstract":"In this study, Deep Web and Dark Web concepts and their relation to each other were evaluated. The working mechanisms of Deep Web and Dark Web examined, the data collected from these media analyzed and the collected data evaluated in terms of information security. Deep Web and Dark Web environments encountered in the criminal content of cyber actions were classified.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ceph-based storage server application 基于ceph的存储服务器应用
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355391
N. Azginoglu, Mehmet Eren, Mete Celik, Z. Aydın
Ceph is a scalable and high performance distributed file system. In this study, a Ceph-based storage server was implemented and used actively. This storage system has been used as a disk of 40 virtual servers in 4 different Proxmox servers. Performance evaluation of the system has been conducted on virtual servers that holds Windows and Linux based operating systems.
Ceph是一个可伸缩的高性能分布式文件系统。在本研究中,实现并积极使用了基于ceph的存储服务器。该存储系统在4个不同的Proxmox服务器中用作40个虚拟服务器的磁盘。在安装Windows和Linux操作系统的虚拟服务器上对系统进行了性能评估。
{"title":"Ceph-based storage server application","authors":"N. Azginoglu, Mehmet Eren, Mete Celik, Z. Aydın","doi":"10.1109/ISDFS.2018.8355391","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355391","url":null,"abstract":"Ceph is a scalable and high performance distributed file system. In this study, a Ceph-based storage server was implemented and used actively. This storage system has been used as a disk of 40 virtual servers in 4 different Proxmox servers. Performance evaluation of the system has been conducted on virtual servers that holds Windows and Linux based operating systems.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel secure model: Image steganography with logistic map and secret key 一种新的安全模型:逻辑映射和密钥的图像隐写
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355320
Mehtap Ulker, Bilgehan Arslan
Nowadays, with the widespread use of the internet, digital images are increasing in use rate. Digital images are attractive for creating a suitable environment for those who want to communicate securely. It is not easy to notice when substituting data into the least significant bit of these images, and the ability to embed excess data makes it attractive to make the use of steganography in secure communication. The aim of this paper is to provide secure communication via a new image steganography using LSB method with secret key and logistic map for generating random numbers. Also it is to compare to other approaches in the literature in term of image quality. As a result, it is seen that the PSNR is 55.91 at the maximum payload capacity namely 29127 bytes and is better than many other steganography algorithms in the literature.
如今,随着互联网的广泛使用,数字图像的使用率越来越高。数字图像在为那些想要安全通信的人创造合适的环境方面具有吸引力。当将数据替换为这些图像的最低有效位时,不容易注意到,并且嵌入多余数据的能力使得在安全通信中使用隐写术具有吸引力。本文的目的是通过使用带有密钥和逻辑映射生成随机数的LSB方法来实现一种新的图像隐写,从而提供安全通信。并与文献中其他方法在图像质量方面进行比较。结果表明,在最大有效载荷容量即29127字节时,PSNR为55.91,优于文献中许多其他隐写算法。
{"title":"A novel secure model: Image steganography with logistic map and secret key","authors":"Mehtap Ulker, Bilgehan Arslan","doi":"10.1109/ISDFS.2018.8355320","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355320","url":null,"abstract":"Nowadays, with the widespread use of the internet, digital images are increasing in use rate. Digital images are attractive for creating a suitable environment for those who want to communicate securely. It is not easy to notice when substituting data into the least significant bit of these images, and the ability to embed excess data makes it attractive to make the use of steganography in secure communication. The aim of this paper is to provide secure communication via a new image steganography using LSB method with secret key and logistic map for generating random numbers. Also it is to compare to other approaches in the literature in term of image quality. As a result, it is seen that the PSNR is 55.91 at the maximum payload capacity namely 29127 bytes and is better than many other steganography algorithms in the literature.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Detection of proxy misconfigurations via log alarms 通过日志告警检测代理配置错误
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355335
Samet Ganal, Mehmet Ali Yalçinkaya, E. Küçüksille
Today, institutions use proxy products for the internet access of their users and arrange the internet access policies of their users by way of this device. Even though proxy takes on the internet access load of the institution by itself, it enables many changes during the day. Human based errors may occur during operations carried out in the day and these errors may cause difficulties for the institution with regard to information security. The objective of this study was to enable automatic detection of erroneous structuring on the proxy without any user feedback before the problem gets out of hand and to initiate the solution process starting from the time that the problem occurs.
今天,机构使用代理产品为其用户上网,并通过该设备安排用户的上网策略。即使代理承担了机构本身的互联网访问负载,它也可以在白天进行许多更改。在白天进行的操作中可能会发生人为错误,这些错误可能会给机构带来信息安全方面的困难。本研究的目的是在问题失控之前,在没有任何用户反馈的情况下自动检测代理上的错误结构,并从问题发生的时候开始启动解决过程。
{"title":"Detection of proxy misconfigurations via log alarms","authors":"Samet Ganal, Mehmet Ali Yalçinkaya, E. Küçüksille","doi":"10.1109/ISDFS.2018.8355335","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355335","url":null,"abstract":"Today, institutions use proxy products for the internet access of their users and arrange the internet access policies of their users by way of this device. Even though proxy takes on the internet access load of the institution by itself, it enables many changes during the day. Human based errors may occur during operations carried out in the day and these errors may cause difficulties for the institution with regard to information security. The objective of this study was to enable automatic detection of erroneous structuring on the proxy without any user feedback before the problem gets out of hand and to initiate the solution process starting from the time that the problem occurs.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129095883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Music based metaheuristic methods for constrained optimization 基于音乐的约束优化元启发式方法
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355355
Elif Varol Altay, B. Alatas
In this work, music based metaheuristic search methods have been collected and discussed for the first time. Harmony Search Algorithm (HS), which are the most well-known music based optimization algorithms, its variants, Method of Musical Composition Algorithm (MMC), and Melody Search Algorithm (MSA) have been examined in detail and their performance tests in terms of different statistical metrics have been carried out with constrained G-suit functions and the results have been demonstrated comparatively. These algorithms are relatively interesting and novel and many efficient versions of them can be proposed and adopted for many types of nonlinear complex problems.
本文首次收集并讨论了基于音乐的元启发式搜索方法。本文对最著名的基于音乐的优化算法——和声搜索算法(HS)及其变体——音乐作曲算法(MMC)和旋律搜索算法(MSA)进行了详细的研究,并在约束G-suit函数下对它们在不同统计指标下的性能进行了测试,并对结果进行了比较验证。这些算法是比较有趣和新颖的,它们的许多有效版本可以被提出并用于许多类型的非线性复杂问题。
{"title":"Music based metaheuristic methods for constrained optimization","authors":"Elif Varol Altay, B. Alatas","doi":"10.1109/ISDFS.2018.8355355","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355355","url":null,"abstract":"In this work, music based metaheuristic search methods have been collected and discussed for the first time. Harmony Search Algorithm (HS), which are the most well-known music based optimization algorithms, its variants, Method of Musical Composition Algorithm (MMC), and Melody Search Algorithm (MSA) have been examined in detail and their performance tests in terms of different statistical metrics have been carried out with constrained G-suit functions and the results have been demonstrated comparatively. These algorithms are relatively interesting and novel and many efficient versions of them can be proposed and adopted for many types of nonlinear complex problems.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128052731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Evaluation of convolutional neural network features for malware detection 用于恶意软件检测的卷积神经网络特征评估
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355390
Kemal Özkan, Ş. Işık, Yusuf Kartal
Advances in machine learning technologies have provided that malicious programs can be detected based on static and dynamic features. Moreover, a crowded set of studies throughout literature indicates that malware detection can be handled with remarkable accuracy rate once converted into image domain. To realize this, some image based techniques have been developed together with feature extraction and classifiers in order to discover the relation between malware binaries in grayscale color representation. With a similar way, we have contributed the CNN features to overcome the malware detection problem. Findings of experimental research support that the malware types can be classified with 85% accuracy rate when applying the machine learning system on 36 (including benign type) malware families consisting of 12,279 malware samples. Moreover, we have achieved the 99% accuracy rate when conducting and experiment on 25 families having 9, 339 malware samples.
机器学习技术的进步使得恶意程序可以根据静态和动态特征进行检测。此外,文献中大量的研究表明,一旦将恶意软件检测转换为图像域,就可以以很高的准确率进行处理。为了实现这一点,一些基于图像的技术与特征提取和分类器一起被开发出来,以发现灰度颜色表示中恶意软件二进制文件之间的关系。以类似的方式,我们贡献了CNN特征来克服恶意软件检测问题。实验研究结果表明,将机器学习系统应用于36个(含良性)恶意软件家族的12279个恶意软件样本中,对恶意软件类型的分类准确率达到85%。此外,我们对25个家族的9339个恶意软件样本进行了实验,准确率达到99%。
{"title":"Evaluation of convolutional neural network features for malware detection","authors":"Kemal Özkan, Ş. Işık, Yusuf Kartal","doi":"10.1109/ISDFS.2018.8355390","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355390","url":null,"abstract":"Advances in machine learning technologies have provided that malicious programs can be detected based on static and dynamic features. Moreover, a crowded set of studies throughout literature indicates that malware detection can be handled with remarkable accuracy rate once converted into image domain. To realize this, some image based techniques have been developed together with feature extraction and classifiers in order to discover the relation between malware binaries in grayscale color representation. With a similar way, we have contributed the CNN features to overcome the malware detection problem. Findings of experimental research support that the malware types can be classified with 85% accuracy rate when applying the machine learning system on 36 (including benign type) malware families consisting of 12,279 malware samples. Moreover, we have achieved the 99% accuracy rate when conducting and experiment on 25 families having 9, 339 malware samples.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Location determination by processing signal strength of Wi-Fi routers in the indoor environment with linear discriminant classifier 利用线性判别分类器处理室内环境中Wi-Fi路由器的信号强度进行定位
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355353
Osman Altay, M. Ulaş
Location determination in the indoor areas as well as in open areas is important for many applications. But location determination in the indoor areas is a very difficult process compared to open areas. The Global Positioning System (GPS) signals used for position detection is not effective in the indoor areas. Wi-Fi signals are a widely used method for localization detection in the indoor area. In the indoor areas, localization can be used for many different purposes, such as intelligent home systems, locations of people, locations of products in the depot. In this study, it was tried to determine localization for with the classification method for 4 different areas by using Wi-Fi signal values obtained from different routers for indoor location determination. Linear discriminant analysis (LDA) classification was used for classification. In the test using 10k fold cross-validation, 97.2% accuracy value was calculated.
在室内和开放区域的位置确定对于许多应用都很重要。但与开放区域相比,室内区域的定位是一个非常困难的过程。用于位置检测的全球定位系统(GPS)信号在室内区域无效。Wi-Fi信号是一种广泛应用于室内区域定位检测的方法。在室内领域,定位可以用于许多不同的目的,例如智能家居系统,人员位置,仓库中产品的位置。在本研究中,利用不同路由器获取的Wi-Fi信号值进行室内定位,尝试用分类方法对4个不同区域进行定位。采用线性判别分析(LDA)分类方法进行分类。在使用10k次交叉验证的测试中,计算出97.2%的准确率值。
{"title":"Location determination by processing signal strength of Wi-Fi routers in the indoor environment with linear discriminant classifier","authors":"Osman Altay, M. Ulaş","doi":"10.1109/ISDFS.2018.8355353","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355353","url":null,"abstract":"Location determination in the indoor areas as well as in open areas is important for many applications. But location determination in the indoor areas is a very difficult process compared to open areas. The Global Positioning System (GPS) signals used for position detection is not effective in the indoor areas. Wi-Fi signals are a widely used method for localization detection in the indoor area. In the indoor areas, localization can be used for many different purposes, such as intelligent home systems, locations of people, locations of products in the depot. In this study, it was tried to determine localization for with the classification method for 4 different areas by using Wi-Fi signal values obtained from different routers for indoor location determination. Linear discriminant analysis (LDA) classification was used for classification. In the test using 10k fold cross-validation, 97.2% accuracy value was calculated.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116458616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
PROTECT-G: Protection of communications in natural gas transportation systems PROTECT-G:保护天然气运输系统中的通信
Pub Date : 2018-03-01 DOI: 10.1109/ISDFS.2018.8355336
B. Genge, H. Piroska, Hunor Sándor
The integration of new Information and Communication Technologies (ICT) within the heart of Industrial Control Systems (ICS) generated a large palette of innovative solutions. As such, the industry has undergone a new technological revolution, also known as Industry 4.0. Nevertheless, this also introduced new threats and vulnerabilities, which significantly affected the stability and the functioning of ICS. This paper reports on the integrated solution developed within the PROTECT-G project. PROTECT-G is a joint effort between academia and industry aiming at protecting the communications in legacy gas transportation systems. It provides an integrated set of protection strategies consisting of an industrial multi-layer firewall, anomaly detection systems, data protection strategies, and a remote attestation protocol.
新信息和通信技术(ICT)在工业控制系统(ICS)核心中的集成产生了大量创新解决方案。因此,该行业经历了一场新的技术革命,也被称为工业4.0。然而,这也带来了新的威胁和漏洞,严重影响了ICS的稳定性和功能。本文报告了在PROTECT-G项目中开发的集成解决方案。PROTECT-G是学术界和工业界的共同努力,旨在保护传统天然气运输系统中的通信。它提供了一套完整的保护策略,包括工业多层防火墙、异常检测系统、数据保护策略和远程认证协议。
{"title":"PROTECT-G: Protection of communications in natural gas transportation systems","authors":"B. Genge, H. Piroska, Hunor Sándor","doi":"10.1109/ISDFS.2018.8355336","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355336","url":null,"abstract":"The integration of new Information and Communication Technologies (ICT) within the heart of Industrial Control Systems (ICS) generated a large palette of innovative solutions. As such, the industry has undergone a new technological revolution, also known as Industry 4.0. Nevertheless, this also introduced new threats and vulnerabilities, which significantly affected the stability and the functioning of ICS. This paper reports on the integrated solution developed within the PROTECT-G project. PROTECT-G is a joint effort between academia and industry aiming at protecting the communications in legacy gas transportation systems. It provides an integrated set of protection strategies consisting of an industrial multi-layer firewall, anomaly detection systems, data protection strategies, and a remote attestation protocol.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128770360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1